Lines Matching refs:access

26 used by Non-secure world applications to access these services. A Trusted OS
53 privileged firmware (i.e. TF-A) to be granted access to system and processor
242 - Interfaces that enable access to privileged operations from S-EL0. These
243 operations typically require access to system resources that are either shared
262 Hence, the SVC conduit must be used by the Secure Partition to access interfaces
409 that it needs access to and their attributes. The SPM validates this resource
413 instruction access permissions.
415 2. Code memory regions are mapped with RO data and Executable instruction access
419 instruction access permissions.
422 instruction access permissions.
607 The SPM is responsible for enabling access to regions of memory in the system
616 access permissions of the memory regions are statically provided by the platform
629 In this case, the Secure Partition needs a way to change the access permissions
668 - Bits[1:0] : Data access permission
670 - b'00 : No access
671 - b'01 : Read-Write access
673 - b'11 : Read-only access
675 - Bit[2]: Instruction access permission
686 - ``INVALID_PARAMETERS``: The Secure Partition is not allowed to access the
712 The SPM must not return the memory access controls for a page of memory that
743 - Bits[1:0] : Data access permission
745 - b'00 : No access
746 - b'01 : Read-Write access
748 - b'11 : Read-only access
750 - Bit[2] : Instruction access permission
772 Partition is not allowed to access part or all of the memory region
805 The SPM must preserve the original memory access controls of the region of